2017-03-13 06:14:00
mitre
PUBLISHED
A vulnerability in a custom-built GoAhead web server used on Foscam, Vstarcam, and multiple white-label IP camera models allows an attacker to craft a malformed HTTP ("GET system.ini HTTP/1.1nn" - note the lack of "/" in the path field of the request) request that will disclose the configuration file with the login password.